General

  • Target

    632-124-0x0000000004A40000-0x0000000004A84000-memory.dmp

  • Size

    272KB

  • MD5

    48c7f7543531e68f11ea5b511bd87023

  • SHA1

    97652c30977dd5a19acd6c122d76c08068c3a9a5

  • SHA256

    232fe43318621a6a943b24733ba8171943e8780dbbad5351adb8fa539fbbc911

  • SHA512

    652d6d1d9d32c5ff48f888446b0f2d7f8b61dee05438fc4251e16f5338c54b42c4a85c169b19830fca96c3a2363af339d1f39a429ee9a2c81d8242376c012829

  • SSDEEP

    3072:N6j4ELN6FY9C7zhf5hwVsmLoQYXJvLc99no40SEBShApnIlJJg6xNn2pU9f2MKTV:N6jidf5hwlLoJvLcPyShSnId

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 632-124-0x0000000004A40000-0x0000000004A84000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections